Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Insights blog.
Read about the latest cybersecurity news and get advice on third-party vendor risk management, reporting cybersecurity to the Board, managing cyber risks, benchmarking security performance, and more.
Bitsight identifies nearly 100,000 exposed industrial control systems

Bitsight identifies nearly 100,000 exposed industrial control systems
Bitsight has identified nearly 100,000 exposed industrial control systems (ICS) owned by organizations around the world, potentially allowing an attacker to access and control physical infrastructure such as power grids, traffic light systems, security and water systems, and more.

How do cyber insurers determine which organizations are going to be a risk worth taking? It’s more important than ever to continue underwriting good and opportunistic risks, while not overcorrecting for the high loss ratios the industry is seeing. Insureds need to answer two questions: what is good cyber hygiene and how do you measure it?

A cybersecurity risk analysis takes the guesswork out of analyzing performance and setting security program goals, here are three metrics to include.

Cyberattacks on state and local governments are on the rise. In 2020, more than 100 government agencies, including municipalities, were targeted with ransomware – an increasingly popular attack vector.

These are the basic steps you should take to develop an effective cyber risk management strategy.

Ransomware is getting more sophisticated, and 1 in 4 breaches involve ransomware. Bitsight analyzed hundreds of ransomware events to estimate the relative probability that an organization will experience a ransomware event. Four areas bubble to the top.

Verizon’s much anticipated 2023 Data Breach Investigations Report (DBIR) is out and we have the missing pieces you need to convert its findings into action.

A vendor risk management checklist will ensure you capture relevant information from your vendors during the onboarding process. Here’s what to include.

A quick list of Apple vulnerabilities as outlined and catalogued by CISA.

When it comes to improving cybersecurity at your organization, there are some fixes that you can undertake with very little preparation. More robust remediation efforts, however, usually start with a cybersecurity risk assessment.

We look at five ways you can reduce cyber threats without putting additional pressure on stretched resources.

It's proxy season, and investors want information from companies about cyber risk. Investors are leveraging Bitsight’s data analytics to better understand the risks of their investments.

Third parties may have weaker security controls than the organizations they provide services to. Learn how to prevent a third party data breach.

Let’s look at how you can establish a cybersecurity baseline that works for your unique risks, industry, and business.

Does your organization have a cybersecurity risk remediation plan? Follow these 5 tips for crafting one.

Network security monitoring tools are a critical component of any IT security toolkit.
Get the Weekly Cybersecurity Newsletter
Subscribe to get security news and industry ratings updates in your inbox.